Passed Cisco 350-018 Exam with Pass4sure and Lead2pass PDF & VCE (51-60)

QUESTION 51
Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual authentication? (Choose three.)

A.    LEAP
B.    EAP-TLS
C.    PEAP
D.    EAP-TTLS
E.    EAP-FAST

Answer: CDE

QUESTION 52
When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)

A.    a message integrity check
B.    AES-based encryption
C.    avoidance of weak Initialization vectors
D.    longer RC4 keys
E.    a rekeying mechanism

Answer: ACE

QUESTION 53
Which option shows the correct sequence of the DHCP packets that are involved in IP address assignment between the DHCP client and the server?

A.    REQUEST, OFFER, ACK
B.    DISCOVER, OFFER, REQUEST, ACK
C.    REQUEST, ASSIGN, ACK
D.    DISCOVER, ASSIGN, ACK
E.    REQUEST, DISCOVER, OFFER, ACK

Answer: B

QUESTION 54
Which common FTP client command transmits a direct, byte-for-byte copy of a file?

A.    ascii
B.    binary
C.    hash
D.    quote
E.    glob

Answer: B

QUESTION 55
Which option is a desktop sharing application, used across a variety of platforms, with default TCP ports 5800/5801 and 5900/5901?

A.    X Windows
B.    remote desktop protocol
C.    VNC
D.    desktop proxy

Answer: C

QUESTION 56
Which two of the following provide protect against man-in-the-middle attacks? (Choose two.)

A.    TCP initial sequence number randomization?
B.    TCP sliding-window checking
C.    Network Address Translation
D.    IPsec VPNs
E.    Secure Sockets Layer

Answer: DE

QUESTION 57
An exploit that involves connecting to a specific TCP port and gaining access to an administrative command prompt is an example of which type of attack?

A.    botnet
B.    Trojan horse
C.    privilege escalation
D.    DoS

Answer: C

QUESTION 58
When configuring an Infrastructure ACL (iACL) to protect the IPv6 infrastructure of an enterprise network, where should the iACL be applied??

A.    all infrastructure devices in both the inbound and outbound direction
B.    all infrastructure devices in the inbound direction
C.    all infrastructure devices in the outbound direction
D.    all parameter devices in both the inbound and outbound direction
E.    all parameter devices in the inbound direction
F.    all parameter devices in the outbound direction

Answer: E

QUESTION 59
What feature on the Cisco ASA is used to check for the presence of an up-to-date antivirus vendor on an AnyConnect client?

A.    Dynamic Access Policies with no additional options
B.    Dynamic Access Policies with Host Scan enabled
C.    advanced endpoint assessment
D.    LDAP attribute maps obtained from Antivirus vendor

Answer: B

QUESTION 60
What type of attack consists of injecting traffic that is marked with the DSCP value of EF into the network?

A.    brute-force attack
B.    QoS marking attack
C.    DHCP starvation attack
D.    SYN flood attack

Answer: B

If you want to pass Cisco 350-018 successfully, donot missing to read latest lead2pass Cisco 350-018 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/350-018.html

         

Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back